Author:
Rong Candong,Gou Gaopeng,Cui Mingxin,Xiong Gang,Li Zhen,Guo Li
Publisher
Springer International Publishing
Reference34 articles.
1. Anderson, B., McGrew, D.: Identifying encrypted malware traffic with contextual flow data. Proc. ACM Workshop Artif. Intell. Secur. 2016, 35–46 (2016)
2. Wang, T.S., Lin, H.T., Cheng, W.T., et al.: DBod: Clustering and detecting DGA-based botnets using DNS traffic analysis. Comput. Secur. 64, 1–15 (2017)
3. Lecture Notes in Computer Science;T Kovanen,2016
4. Wang, W., Sheng, Y., Wang, J., et al.: HAST-IDS: Learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6, 1792–1806 (2017)
5. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;S Zhao,2019
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献